Enterprise Security Weekly (Audio) cover image

Secrets and their role in infrastructure security - Jawahar Sivasankaran, Chas Clawson, Sergey Gorbaty, Fernando Medrano - ESW #406

Enterprise Security Weekly (Audio)

00:00

Navigating Authentication Methods

This chapter explores the contrast between bearer tokens and identity-centric authentication, highlighting the benefits of understanding the requester’s identity for enhanced security and permission management. It discusses the shift towards short-lived identity tokens and their role in simplifying interactions and improving visibility within infrastructure security.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app